Visible to the public Source Code Vulnerability Mining Method based on Graph Neural Network

TitleSource Code Vulnerability Mining Method based on Graph Neural Network
Publication TypeConference Paper
Year of Publication2022
AuthorsJiang, Zhenghong
Conference Name2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI)
Keywordscodes, coding theory, composability, compositionality, Correlation, cryptography, feature extraction, Graph Neural Network, Manuals, Metrics, Mining Method, Optimization methods, pubcrawl, resilience, Resiliency, security, source code vulnerability, Training, Uncertainty
AbstractVulnerability discovery is an important field of computer security research and development today. Because most of the current vulnerability discovery methods require large-scale manual auditing, and the code parsing process is cumbersome and time-consuming, the vulnerability discovery effect is reduced. Therefore, for the uncertainty of vulnerability discovery itself, it is the most basic tool design principle that auxiliary security analysts cannot completely replace them. The purpose of this paper is to study the source code vulnerability discovery method based on graph neural network. This paper analyzes the three processes of data preparation, source code vulnerability mining and security assurance of the source code vulnerability mining method, and also analyzes the suspiciousness and particularity of the experimental results. The empirical analysis results show that the types of traditional source code vulnerability mining methods become more concise and convenient after using graph neural network technology, and we conducted a survey and found that more than 82% of people felt that the design source code vulnerability mining method used When it comes to graph neural networks, it is found that the design efficiency has become higher.
DOI10.1109/ICETCI55101.2022.9832392
Citation Keyjiang_source_2022